3 min read
Are Criminals Entering Your Network Through a Backdoor in the Cloud?
Ubiquitous, destructive, and difficult to defend, backdoor attacks of cloud services constitute unique threats to enterprise networks — and they...
3 min read
Ubiquitous, destructive, and difficult to defend, backdoor attacks of cloud services constitute unique threats to enterprise networks — and they...
2 min read
“Software-defined networking” has become something of an IT industry buzzword, but its underlying mechanics are more complicated than many people...
2 min read
As companies in the petrochemical space incorporate big data and cloud computing into their networking infrastructures while employing leaner remote...
3 min read
The technology is being developed for and deployed in practically every industry, but what does the term “machine learning” really mean? More...
2 min read
5G will enable faster mobile internet speeds and lower latency times, while making it far easier to support IoT devices. But new challenges to indoor...
2 min read
By leveraging a simple botnet, hackers were able to submit millions of fraudulent comments to the FCC in advance of its vote on net neutrality. We’ve...
2 min read
Internet-connected devices like smart security cameras offer enterprises numerous benefits, but with those benefits come serious cybersecurity risks....
3 min read
To realize the tremendous potential of the Internet of Underwater Things, the networking community first must find a solution to the problem of...
3 min read
Courthouses can be dangerous places for judicial officials, which is why stronger security systems are desperately needed. On March 11, 2005, Brian...
2 min read
Sophisticated analytics tools are all but a must in increasingly complex networking environments like colleges and universities. “Over the past five...
3 min read
Cyberinsurance is increasing in popularity, but it’s no substitute for a strong set of cybersecurity protocols. “Cyber is uncharted territory,”...
2 min read
The ongoing cybersecurity skills shortage is forcing many companies to find creative ways of keeping their IT infrastructure secure. As author and...